[vc_row centered=”yes” bg_type=”image” parallax_style=”vcpb-default” bg_image_new=”id^1087|url^|caption^null|alt^null|title^canstockphoto1009106|description^null” bg_image_repeat=”no-repeat” bg_image_size=”initial” bg_image_posiiton=”center center” padding_top=”115px” padding_bottom=”115px”][vc_column][ultimate_heading main_heading=”Security” alignment=”left” spacer=”line_only” spacer_position=”bottom” line_height=”1″ line_color=”#39b54a” line_width=”50″ main_heading_margin=”margin-bottom:10px;”][/ultimate_heading][/vc_column][/vc_row][vc_row centered=”yes” padding_top=”115px” padding_bottom=”115px” sd_margin_bottom=”0px”][vc_column][vc_column_text]Privacy is crucial when working with research data. Personal data is stored, although participant data is located only with a study number, and that should be as save as possible.

Who has access
During the build of the sites and databases, several people are working on the project. Developers, designers, etcetera.
Once the project is tested and the study is actually gathering data, only our primary developer (Robert de Leeuw) has access to all data.
Robert de Leeuw is a physician and researcher himself and is usually a partner in the study. He is bound by his confidentiality as a doctor and a researcher.
Only during an update or adaptation of the system and/or functionalities, other (highly trusted) developers can have temporary access. They all have signed a confidentiality agreement with IdeAct. Of course we can make an account for the principal investigator or other researchers depending on the study. The daily backups of the site and the database are stored safely. It is possible to share the backups with the research team, for example using dropbox, so that all data is also always available for the research group.

It is always possible to hack a website and a database. If the FBI can get hacked, so can we. But we try everything we can to prevent this. The servers (the home pf the sites, app data, etc) is hosted by an English, high security, facility and meets all UK requirements for patient and bank confidentiality. This means that the server is protected by firewalls, antivirus and antimalware scanners, SSL, DNSSEC, etc.

We make use of extreme secure servers, hosted and maintained by a UK company; ThatIT. Please download all details in the PDF below.[/vc_column_text][vc_btn title=”Download our server Security details” color=”danger” align=”center” i_icon_fontawesome=”fa fa-info-circle” button_block=”true” add_icon=”true” link=”||target:%20_blank|”][/vc_column][/vc_row]